What will protect our software-enabled cars?

Why secure the entire automotive ecosystem

Regulatory attention


Autonomous driving

Shaping automotive cybersecurity

  • Cybersecurity has to be baked into a company’s processes right from the very beginning — from design and development through manufacturing.
  • An ‘assume harm’ posture will serve the industry well, and guide both software and hardware developers to create systems with cybersecurity built into them, at all levels.
  • As automotive ecosystems grow and evolve, software could come from multiple suppliers and run on the same hardware platform. All software must be analyzed for threats and common vulnerabilities, through software composition analysis, penetration testing and periodic risk assessments.
  • Such an environment requires defense-in-depth strategies, which include secure updates, secure boot, identity access management, isolation-through-virtualization techniques etc.
  • The microchips used within a vehicle’s ECUs must be secured. Secure hardware capabilities include secure storage, tamper detection, hardware acceleration for crypto-algorithms, secure firmware upgrades, secure key updates, secure boot, secure debug and other features.




Insurance made simple. www.roadzen.io

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium


The IoT — Internet of Things

The cyberthreat name game: Good or bad?

Prevent, Detect and Respond: Phases of Information Security Process

Your Data in the Age of the Internet

Dealing with the GDPR: How companies will benefit from MADANA

{UPDATE} 全民过马路:萌宠太空漫步一起秀 Hack Free Resources Generator

Routelay & Nexus.io

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Insurance made simple. www.roadzen.io

More from Medium

Learning #2: Can we turn shipping containers into carbon capture factories?

The difference between cloud hosting and shared hosting.

Desktop computer

Part 1: Importance of Fleet Electrification

Humble Bee Bio to use Ginkgo Bioworks Cell Development Kit to Advance Biomaterials Product